dbrgn / descrackLinks
HSR OpenCL research project based on existing code.
☆13Updated 9 years ago
Alternatives and similar repositories for descrack
Users that are interested in descrack are comparing it to the libraries listed below
Sorting:
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ☆34Updated 6 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Updated 8 years ago
- Agent part of Hashtopus☆17Updated 8 years ago
- A mirror of strobe☆12Updated 3 years ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Updated 3 years ago
- Airprobe for frequency hopping GSM channels☆31Updated 11 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Updated 7 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 5 years ago
- ☆30Updated 10 years ago
- Web of trust grapher☆39Updated 7 months ago
- Kraken A5/1 Cracking Project Fork☆62Updated 11 years ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆27Updated 12 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 5 years ago
- Project Gutenberg Australia word lists☆15Updated 4 years ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Generic Identity Device Specification Applet☆110Updated 2 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆35Updated 3 months ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Updated 3 weeks ago
- Prototype private key hashing agent☆16Updated 8 years ago
- ☆59Updated 2 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Vulnerability scanner for OFX servers☆32Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆63Updated 9 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- USB armory - boot loader☆39Updated last week